skip to main content
research-article
Open Access

The Influence of Friends and Experts on Privacy Decision Making in IoT Scenarios

Published:01 November 2018Publication History
Skip Abstract Section

Abstract

As increasingly many Internet-of-Things (IoT) devices collect personal data, users face more privacy decisions. Personal privacy assistants can provide social cues and help users make informed decisions by presenting information about how others have decided in similar cases. To better understand which social cues are relevant and whose recommendations users are more likely to follow, we presented 1000 online participants with nine IoT data-collection scenarios. Some participants were told the percentage of experts or friends who allowed data collection in each scenario, while other participants were provided no social cue. At the conclusion of each scenario, participants were asked whether they would allow the described data collection. Our results help explain under what circumstances users are more or less likely to be swayed by the reported behavior of others in similar scenarios. For example, our results indicate that when friends denied data collection, our participants were more influenced than when friends allowed data collection. On the other hand, participants were more influenced by experts when they allowed data collection. We also observed that influence could get stronger or wear off when participants were exposed to a sequence of scenarios. For example, when experts and friends repeatedly allowed data collection in scenarios with clear risk or denied it in scenarios with clear benefits, participants were less likely to be influenced by them in subsequent scenarios.

References

  1. Herman Aguinis and Kyle J Bradley. 2014. Best practice recommendations for designing and implementing experimental vignette methodology studies. Organizational Research Methods 17, 4 (2014), 351--371.Google ScholarGoogle ScholarCross RefCross Ref
  2. Vernon L Allen. 1965. Situational factors In conformity1. In Advances in experimental social psychology. Vol. 2. Elsevier, 133--175.Google ScholarGoogle Scholar
  3. Vernon L Allen and John M Levine. 1971. Social support and conformity: The role of independent assessment of reality. Journal of Experimental Social Psychology 7, 1 (1971), 48--58.Google ScholarGoogle ScholarCross RefCross Ref
  4. Solomon E Asch. 1956. Studies of independence and conformity: I. A minority of one against a unanimous majority. Psychological monographs: General and applied 70, 9 (1956), 1.Google ScholarGoogle Scholar
  5. Martina Balestra, Orit Shaer, Johanna Okerlund, Madeleine Ball, and Oded Nov. 2016. The Effect of Exposure to Social Annotation on Online Informed Consent Beliefs and Behavior. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW '16). ACM, New York, NY, USA, 900--912. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Jonathan Baron. 2000. Thinking and deciding. Cambridge University Press.Google ScholarGoogle Scholar
  7. Robert S Baron, Joseph A Vandello, and Bethany Brunsman. 1996. The forgotten variable in conformity research: Impact of task importance on social influence. Journal of personality and social psychology 71, 5 (1996), 915.Google ScholarGoogle ScholarCross RefCross Ref
  8. Christine Barter and Emma Renold. 1999. The use of vignettes in qualitative research. Social research update 25, 9 (1999), 1--6.Google ScholarGoogle Scholar
  9. Debjanee Barua, Judy Kay, and Cécile Paris. 2013. Viewing and controlling personal sensor data: what do users want?. In International Conference on Persuasive Technology. Springer, 15--26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Michael Benisch, Patrick Gage Kelley, Norman Sadeh, and Lorrie Faith Cranor. 2011. Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs. Personal and Ubiquitous Computing 15, 7 (2011), 679--694. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Andrew Besmer, Jason Watson, and Heather Richter Lipford. 2010. The Impact of Social Navigation on Privacy Policy Configuration. In Proceedings of the Sixth Symposium on Usable Privacy and Security (SOUPS '10). ACM, New York, NY, USA, Article 7, 10 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Sushil Bikhchandani, David Hirshleifer, and Ivo Welch. 1992. A theory of fads, fashion, custom, and cultural change as informational cascades. Journal of political Economy 100, 5 (1992), 992--1026.Google ScholarGoogle ScholarCross RefCross Ref
  13. Michael Buhrmester, Tracy Kwang, and Samuel D Gosling. 2011. Amazon's Mechanical Turk: A new source of inexpensive, yet high-quality, data? Perspectives on psychological science 6, 1 (2011), 3--5.Google ScholarGoogle Scholar
  14. Ronald S Burt. 2017. Structural holes versus network closure as social capital. In Social capital. Routledge, 31--56.Google ScholarGoogle Scholar
  15. Scott Camazine. 2003. Self-organization in biological systems. Princeton University Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Richard Chow. 2017. The Last Mile for IoT Privacy. IEEE Security & Privacy 15, 6 (2017), 73--76.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Robert B Cialdini and Noah J Goldstein. 2004. Social influence: Compliance and conformity. Annu. Rev. Psychol. 55 (2004), 591--621.Google ScholarGoogle ScholarCross RefCross Ref
  18. Robert T Clemen and Robert L Winkler. 1986. Combining economic forecasts. Journal of Business & Economic Statistics 4, 1 (1986), 39--46.Google ScholarGoogle Scholar
  19. Janet Fagan Coleman, Robert R Blake, and Jane Srygley Mouton. 1958. Task difficulty and conformity pressures. The Journal of Abnormal and Social Psychology 57, 1 (1958), 120.Google ScholarGoogle ScholarCross RefCross Ref
  20. Iain D Couzin, Christos C Ioannou, Güven Demirel, Thilo Gross, Colin J Torney, Andrew Hartnett, Larissa Conradt, Simon A Levin, and Naomi E Leonard. 2011. Uninformed individuals promote democratic consensus in animal groups. science 334, 6062 (2011), 1578--1580.Google ScholarGoogle Scholar
  21. Matthew A Cronin and Laurie R Weingart. 2007. Representational gaps, information processing, and conflict in functionally diverse teams. Academy of Management Review 32, 3 (2007), 761--773.Google ScholarGoogle ScholarCross RefCross Ref
  22. Anupam Das, Martin Degeling, Daniel Smullen, and Norman Sadeh. 2018. Personalized Privacy Assistants for the Internet of Things. (2018).Google ScholarGoogle Scholar
  23. Sauvik Das, Adam D.I. Kramer, Laura A. Dabbish, and Jason I. Hong. 2015. The Role of Social Influence in Security Feature Adoption. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '15). ACM, New York, NY, USA, 1416--1426. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Thomas H Davenport. 2013. Analytics in Healthcare and the Life Sciences: Strategies, Implementation Methods, and Best Practices. Pearson Education.Google ScholarGoogle Scholar
  25. Morton Deutsch and Harold B Gerard. 1955. A study of normative and informational social influences upon individual judgment. The journal of abnormal and social psychology 51, 3 (1955), 629.Google ScholarGoogle Scholar
  26. Paul DiGioia and Paul Dourish. 2005. Social navigation as a model for usable security. In Proceedings of the 2005 symposium on Usable privacy and security. ACM, 101--108. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Nora A. Draper. 2017. From Privacy Pragmatist to Privacy Resigned: Challenging Narratives of Rational Choice in Digital Privacy Debates: Challenging Rational Choice in Digital Privacy Debates. Policy & Internet 9, 2 (June 2017), 232--251.Google ScholarGoogle ScholarCross RefCross Ref
  28. Janna Lynn Dupree, Richard Devries, Daniel M. Berry, and Edward Lank. 2016. Privacy Personas: Clustering Users via Attitudes and Behaviors Toward Security Practices. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 5228--5239. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Pardis Emami-Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Cranor, and Norman Sadeh. 2017. Privacy expectations and preferences in an IoT world. In SOUPS '17: Proceedings of the 13th Symposium on Usable Privacy and Security. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Leon Festinger. 1954. A theory of social comparison processes. Human relations 7, 2 (1954), 117--140.Google ScholarGoogle Scholar
  31. David Gefen, Izak Benbasat, and Paula Pavlou. 2008. A research agenda for trust in online environments. Journal of Management Information Systems 24, 4 (2008), 275--286. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Francesca Gino and Don A Moore. 2007. Effects of task difficulty on use of advice. Journal of Behavioral Decision Making 20, 1 (2007), 21--35.Google ScholarGoogle ScholarCross RefCross Ref
  33. Jeremy Goecks, W Keith Edwards, and Elizabeth D Mynatt. 2009. Challenges in supporting end-user privacy and security management with social navigation. In Proceedings of the 5th Symposium on Usable Privacy and Security. ACM, 5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Jeremy Goecks and Elizabeth D Mynatt. 2005. Supporting privacy management via community experience and expertise. In Communities and Technologies 2005. Springer, 397--417.Google ScholarGoogle Scholar
  35. Joseph K Goodman, Cynthia E Cryder, and Amar Cheema. 2013. Data collection in a flat world: The strengths and weaknesses of Mechanical Turk samples. Journal of Behavioral Decision Making 26, 3 (2013), 213--224.Google ScholarGoogle ScholarCross RefCross Ref
  36. Nigel Harvey and Ilan Fischer. 1997. Taking advice: Accepting help, improving judgment, and sharing responsibility. Organizational Behavior and Human Decision Processes 70, 2 (1997), 117--133.Google ScholarGoogle ScholarCross RefCross Ref
  37. Chip Heath, Richard P Larrick, and Joshua Klayman. 1998. Cognitive repairs: How organizational practices can compensate for individual shortcomings. In Review of Organizational Behavior. Citeseer.Google ScholarGoogle Scholar
  38. Paul Hewson. 2016. Statistical Rethinking: a Bayesian Course with Examples in R and Stan R. McElreath, 2015 Boca Raton Chapman and Hall--CRC 470 pp.,£ 60.99 ISBN 978--1--482--25344--3. Journal of the Royal Statistical Society: Series A (Statistics in Society) 179, 4 (2016), 1131--1132.Google ScholarGoogle ScholarCross RefCross Ref
  39. Bert H Hodges, Benjamin R Meagher, Daniel J Norton, Ryan McBain, and Ariane Sroubek. 2014. Speaking from ignorance: Not agreeing with others we believe are correct. Journal of Personality and Social Psychology 106, 2 (2014), 218.Google ScholarGoogle ScholarCross RefCross Ref
  40. David W Hosmer Jr, Stanley Lemeshow, and Rodney X Sturdivant. 2013. Applied logistic regression. Vol. 398. John Wiley & Sons.Google ScholarGoogle Scholar
  41. Arthur Jenness. 1932. The role of discussion in changing opinion regarding a matter of fact. The Journal of Abnormal and Social Psychology 27, 3 (1932), 279.Google ScholarGoogle ScholarCross RefCross Ref
  42. Helmut Jungermann and Katrin Fischer. 2005. Using expertise and experience for giving and taking advice. The routines of decision making (2005), 157--173.Google ScholarGoogle Scholar
  43. Joseph B Kadane and Nicole A Lazar. 2004. Methods and Criteria for Model Selection. J. Amer. Statist. Assoc. 99, 465 (2004), 279--290. arXiv:https://doi.org/10.1198/016214504000000269Google ScholarGoogle ScholarCross RefCross Ref
  44. Ruogu Kang, Stephanie Brown, Laura Dabbish, and Sara Kiesler. 2014. Privacy attitudes of mechanical turk workers and the us public. In Symposium on Usable Privacy and Security (SOUPS), Vol. 4. 1. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Herbert C Kelman. 1958. Compliance, identification, and internalization three processes of attitude change. Journal of conflict resolution 2, 1 (1958), 51--60.Google ScholarGoogle ScholarCross RefCross Ref
  46. Predrag Klasnja, Sunny Consolvo, Tanzeem Choudhury, Richard Beckwith, and Jeffrey Hightower. 2009. Exploring privacy concerns about personal sensing. In International Conference on Pervasive Computing. Springer, 176--183. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. B. P. Knijnenburg. 2017. Privacy? I Can't Even! Making a Case for User-Tailored Privacy. IEEE Security & Privacy 15, 4 (2017), 62--67.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Joseph A. Konstan and John Riedl. 2003. Designing Information Spaces. Springer-Verlag, London, UK, UK, Chapter Collaborative Filtering: Supporting Social Navigation in Large, Crowded Infospaces, 43--82. http://dl.acm.org/citation. cfm?id=937956.937959 Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Ponnurangam Kumaraguru and Lorrie Cranor. 2005. Privacy indexes : a survey of Westin's studies. Institute for Software Research (Jan. 2005). http://repository.cmu.edu/isr/856Google ScholarGoogle Scholar
  50. J. Richard Landis and Gary G. Koch. 1977. The Measurement of Observer Agreement for Categorical Data. Biometrics 33, 1 (March 1977), 159.Google ScholarGoogle Scholar
  51. Marc Langheinrich. 2002. A Privacy Awareness System for Ubiquitous Computing Environments. In Proceedings of the 4th International Conference on Ubiquitous Computing (UbiComp '02). Springer-Verlag, London, UK, UK, 237--245. http://dl.acm.org/citation.cfm?id=647988.741491 Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Richard P Larrick and Jack B Soll. 2006. Intuitions about combining opinions: Misappreciation of the averaging principle. Management science 52, 1 (2006), 111--127. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Bibb Latané. 1981. The psychology of social impact. American psychologist 36, 4 (1981), 343.Google ScholarGoogle Scholar
  54. Scott Lederer, Jennifer Mankoff, and Anind K Dey. 2003. Who wants to know what when? privacy preference determinants in ubiquitous computing. In CHI'03 extended abstracts on Human factors in computing systems. ACM, 724--725. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Hosub Lee and Alfred Kobsa. 2016. Understanding user privacy in Internet of Things environments. In Internet of Things (WF-IoT), 2016 IEEE 3rd World Forum on. IEEE, 407--412.Google ScholarGoogle ScholarCross RefCross Ref
  56. Hosub Lee and Alfred Kobsa. 2017. Privacy preference modeling and prediction in a simulated campuswide IoT environment. In 2017 IEEE International Conference on Pervasive Computing and Communications, PerCom 2017, Hawaii, USA, March 13--17, 2017. 276--285.Google ScholarGoogle ScholarCross RefCross Ref
  57. Hosub Lee and Alfred Kobsa. 2017. Privacy preference modeling and prediction in a simulated campuswide IoT environment. In Pervasive Computing and Communications (PerCom), 2017 IEEE International Conference on. IEEE, 276--285.Google ScholarGoogle ScholarCross RefCross Ref
  58. Linda Lee, JoongHwa Lee, Serge Egelman, and David Wagner. {n. d.}. Information Disclosure Concerns in The Age of Wearable Computing. In Proceedings of the NDSS Workshop on Usable Security, USEC 2016, Internet Society. February 10, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  59. Jialiu Lin, Shahriyar Amini, Jason I Hong, Norman Sadeh, Janne Lindqvist, and Joy Zhang. 2012. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing. ACM, 501--510. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Bin Liu, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun Zhang, Norman M. Sadeh, Yuvraj Agarwal, and Alessandro Acquisti. 2016. Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions. In Twelfth Symposium on Usable Privacy and Security, SOUPS 2016, Denver, CO, USA, June 22--24, 2016. 27--41. https://www.usenix.org/conference/soups2016/technical-sessions/presentation/liu Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Steson Lo and Sally Andrews. 2015. To transform or not to transform: Using generalized linear mixed models to analyse reaction time data. Frontiers in Psychology 6 (2015), 1171.Google ScholarGoogle ScholarCross RefCross Ref
  62. Jan Lorenz, Heiko Rauhut, Frank Schweitzer, and Dirk Helbing. 2011. How social influence can undermine the wisdom of crowd effect. Proceedings of the National Academy of Sciences 108, 22 (2011), 9020--9025.Google ScholarGoogle ScholarCross RefCross Ref
  63. Todd Lucas, Sheldon Alexander, Ira J Firestone, and Boris B Baltes. 2006. Self-efficacy and independence from social influence: Discovery of an efficacy--difficulty effect. Social Influence 1, 1 (2006), 58--80.Google ScholarGoogle ScholarCross RefCross Ref
  64. Diane M Mackie. 1987. Systematic and nonsystematic processing of majority and minority persuasive communications. Journal of Personality and Social Psychology 53, 1 (1987), 41.Google ScholarGoogle ScholarCross RefCross Ref
  65. Kathleen M. MacQueen, Eleanor McLellan, Kelly Kay, and Bobby Milstein. 1998. Codebook Development for TeamBased Qualitative Analysis. CAM Journal 10, 2 (May 1998), 31--36.Google ScholarGoogle ScholarCross RefCross Ref
  66. Albert E Mannes. 2009. Are we wise about the wisdom of crowds? The use of group judgments in belief revision. Management Science 55, 8 (2009), 1267--1279. Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Robin Martin, Antonis Gardikiotis, and Miles Hewstone. 2002. Levels of consensus and majority and minority influence. European Journal of Social Psychology 32, 5 (2002), 645--665.Google ScholarGoogle ScholarCross RefCross Ref
  68. Pavlin Mavrodiev, Claudio J Tessone, and Frank Schweitzer. 2012. Effects of social influence on the wisdom of crowds. arXiv preprint arXiv:1204.3463 (2012).Google ScholarGoogle Scholar
  69. Pavlin Mavrodiev, Claudio J Tessone, and Frank Schweitzer. 2013. Quantifying the effects of social influence. Scientific reports 3 (2013), 1360.Google ScholarGoogle Scholar
  70. Alex Mayle, Neda Hajiakhoond Bidoki, Sina Masnadi, Ladislau Boeloeni, and Damla Turgut. 2017. Investigating the Value of Privacy within the Internet of Things. In GLOBECOM 2017--2017 IEEE Global Communications Conference. IEEE, 1--6.Google ScholarGoogle Scholar
  71. Tamir Mendel and Eran Toch. 2017. Susceptibility to Social Influence of Privacy Behaviors: Peer Versus Authoritative Sources. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17). ACM, New York, NY, USA, 581--593. Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Dar Meshi, Guido Biele, Christoph W Korn, and Hauke R Heekeren. 2012. How expert advice influences decision making. PLoS One 7, 11 (2012), e49748.Google ScholarGoogle ScholarCross RefCross Ref
  73. A. Morton and M. A. Sasse. 2014. Desperately seeking assurances: Segmenting users by their information-seeking preferences. In 2014 Twelfth Annual International Conference on Privacy, Security and Trust. 102--111.Google ScholarGoogle Scholar
  74. Mehdi Moussaid, Simon Garnier, Guy Theraulaz, and Dirk Helbing. 2009. Collective information processing and pattern formation in swarms, flocks, and crowds. Topics in Cognitive Science 1, 3 (2009), 469--497.Google ScholarGoogle ScholarCross RefCross Ref
  75. Raymond S Nickerson. 1998. Confirmation bias: A ubiquitous phenomenon in many guises. Review of general psychology 2, 2 (1998), 175.Google ScholarGoogle Scholar
  76. Helen Nissenbaum. 2004. Privacy as Contextual Integrity. Washington Law Review 79 (2004), 119. http://nyu.edu/ projects/nissenbaum/papers/washingtonlawreview.pdfGoogle ScholarGoogle Scholar
  77. Gabriele Paolacci, Jesse Chandler, and Panagiotis G Ipeirotis. 2010. Running experiments on amazon mechanical turk. (2010).Google ScholarGoogle Scholar
  78. Sameer Patil, Xinru Page, and Alfred Kobsa. 2011. With a little help from my friends: can social navigation inform interpersonal privacy preferences?. In Proceedings of the 2011 ACM Conference on Computer Supported Cooperative Work, CSCW 2011, Hangzhou, China, March 19--23, 2011. 391--394. Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. Paul Resnick, Ko Kuwabara, Richard Zeckhauser, and Eric Friedman. 2000. Reputation Systems. Commun. ACM 43, 12 (Dec. 2000), 45--48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. Joel Ross, Andrew Zaldivar, Lilly Irani, and Bill Tomlinson. 2009. Who are the Turkers? Worker Demographics in Amazon Mechanical Turk. (01 2009).Google ScholarGoogle Scholar
  81. Muzafer Sherif. 1935. A study of some social factors in perception. Archives of Psychology (Columbia University) (1935).Google ScholarGoogle Scholar
  82. Jack B Soll and Albert E Mannes. 2011. Judgmental aggregation strategies depend on whether the self is involved. International Journal of Forecasting 27, 1 (2011), 81--102.Google ScholarGoogle ScholarCross RefCross Ref
  83. Erin L Spottswood and Jeffrey T Hancock. 2017. Should I share that? Prompting social norms that influence privacy behaviors on a social networking site. Journal of Computer-Mediated Communication 22, 2 (2017), 55--70. Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. James Surowiecki. 2005. The wisdom of crowds. Anchor. Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. Ulf Toelch, Marjolijn J van Delft, Matthew J Bruce, Rogier Donders, Marius TH Meeus, and Simon M Reader. 2009. Decreased environmental variability induces a bias for social information use in humans. Evolution and Human Behavior 30, 1 (2009), 32--40.Google ScholarGoogle ScholarCross RefCross Ref
  86. Ilaria Torre, Odnan Ref Sanchez, Frosina Koceva, and Giovanni Adorni. 2018. Supporting users to take informed decisions on privacy settings of personal devices. Personal and Ubiquitous Computing 22, 2 (2018), 345--364. Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. Trisha Van Zandt and Roger Ratcliff. 1995. Statistical mimicking of reaction time data: Single-process models, parameter variability, and mixtures. Psychonomic Bulletin & Review 2, 1 (1995), 20--54.Google ScholarGoogle ScholarCross RefCross Ref
  88. Ilan Yaniv and Eli Kleinberger. 2000. Advice taking in decision making: Egocentric discounting and reputation formation. Organizational behavior and human decision processes 83, 2 (2000), 260--281.Google ScholarGoogle Scholar
  89. Tao Zhou. 2011. An empirical examination of initial trust in mobile banking. Internet Research 21, 5 (2011), 527--540.Google ScholarGoogle ScholarCross RefCross Ref
  90. Jan Henrik Ziegeldorf, Oscar Garcia Morchon, and Klaus Wehrle. 2014. Privacy in the Internet of Things: threats and challenges. Security and Communication Networks 7, 12 (2014), 2728--2742.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. The Influence of Friends and Experts on Privacy Decision Making in IoT Scenarios

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader